2 research outputs found

    A review on structured scheme representation on data security application

    Get PDF
    With the rapid development in the era of Internet and networking technology, there is always a requirement to improve the security systems, which secure the transmitted data over an unsecured channel. The needs to increase the level of security in transferring the data always become the critical issue. Therefore, data security is a significant area in covering the issue of security, which refers to protect the data from unwanted forces and prevent unauthorized access to a communication. This paper presents a review of structured-scheme representation for data security application. There are five structured-scheme types, which can be represented as dual-scheme, triple-scheme, quad-scheme, octal-scheme and hexa-scheme. These structured-scheme types are designed to improve and strengthen the security of data on the application

    Practical considerations on Quantum Key Distribution (QKD)

    No full text
    The advancement of the quantum computing is challenging the foundation of the cryptography by its almost unlimited computation power to predict the secure key that is thought to be absolutely secure based on the currently used algorithms such as the RSA and the Diffie-Hellman and others. The field of quantum cryptography on the other hand is providing the needed highly secure keys through the introduction of quantum key distribution QKD when the quantum computing becomes a reality. However, the quantum cryptography and the QKD are challenged in many ways, not only to provide the advanced level of technology but also to overcome many constraints to provide a worldwide practical distribution system as well as to provide the efficiency to overcome the very modest size of the quantum keys. In this paper, practical factors affecting realistic QKD are investigated supported by related simulation based analysis
    corecore